Despite having dropped in our poll from third to sixth, we continue to see a lot of interest in this area. According to sister site WhatIs.com, an IDS gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions from outside and inside. But how do you go about developing, implementing and maintaining such a system? We've gathered several resources...

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

E-Chapter

0 comments

E-Mail

Username / Password

Password

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy